학술논문

State machine replication under changing network conditions.
Document Type
Proceedings Paper
Author
Alexandru, Andreea B. (1-MD-NDM) AMS Author Profile; Blum, Erica (1-MD-NDM) AMS Author Profile; Katz, Jonathan (1-MD-NDM) AMS Author Profile; Loss, Julian (D-CISPA) AMS Author Profile
Source
Advances in cryptology---ASIACRYPT 2022. Part I (20220101), 681-710.
Subject
94 Information and communication, circuits -- 94A Communication, information
  94A60 Cryptography
Language
English
Abstract
Summary: ``Protocols for state machine replication (SMR) are typicallydesigned for synchronous or asynchronous networks, with a lowercorruption threshold in the latter case. Recent {\it network-agnostic}protocols are secure when run in either a synchronous or anasynchronous network. We propose two new constructions ofnetwork-agnostic SMR protocols that improve on existing protocols interms of either the adversarial model or communication complexity:\roster\item"1." an {\it adaptively} secure protocol with optimal corruption thresholdsand quadratic amortized communication complexity per transaction;\item"2." a statically secure protocol with near-optimal corruption thresholdsand {\it linear} amortized communication complexity per transaction.\endroster We further explore SMR protocols run in a network that may changebetween synchronous and asynchronous arbitrarily often; parties can beuncorrupted (as in the proactive model), and the protocol should remainsecure as long as the appropriate corruption thresholds are maintained.We show that purely asynchronous proactive secret sharing is impossiblewithout some form of synchronization between the parties, ruling out anatural approach to proactively secure network-agnostic SMR protocols.Motivated by this negative result, we consider a model where theadversary is limited in the total number of parties it can corrupt overthe duration of the protocol and show, in this setting, that our SMRprotocols remain secure even under arbitrarily changing networkconditions.''MR

Online Access